"Cipher" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 15 of 50 - About 500 Essays
  • Powerful Essays

    Subasree & Sakthivel ● Design of a New Security Protocol IJRRAS 2 (2) ● February 2010 DESIGN OF A NEW SECURITY PROTOCOL USING HYBRID CRYPTOGRAPHY ALGORITHMS S. Subasree and N. K. Sakthivel School of Computing‚ Sastra University‚ Thanjavur – 613401‚ Tamil Nadu‚ INDIA. ABSTRACT A Computer Network is an interconnected group of autono mous computing nodes‚ which use a well defined‚ mutually agreed set of rules and conventions known as protocols‚ interact with one -another meaningfully

    Premium Cryptography

    • 3590 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    encryption‚” Advances in Cryptology–EUROCRYPT‚ 2005. [4]V. Goyal‚ O. Pandey‚ A. Sahai‚ and B. Waters‚ “Attribute-based encryption for fine-grained access control of encrypted data‚” in Proc. of ACM 2006. [5]J. Bethencourt‚ A. Sahai‚ and B. Waters‚ “Cipher text-policy attribute-based encryption‚” in Proc. of IEEE Symposium on S&P‚ 2007. [6]M. Blaze‚ G. Bleumer‚ and M. Strauss‚ “Divertible protocols and atomic proxy cryptography‚” Advances in Cryptology–EUROCRYPT‚ 1998. [7]A. Boldyreva‚ V. Goyal‚ and

    Premium Cloud computing Cryptography

    • 2334 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Gsm Architecture

    • 2943 Words
    • 12 Pages

    GSM 1 Mobile Communications GSM Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto GSM 2 Acknowledgements ♦ These slides are based on the slides developed by » Prof. Jochen Schiller – Slides from the book “Mobile Communication: Wireless Telecommunication Systems” – http://www.jochenschiller.de » Prof. Mário Jorge Leitão – http://www.fe.up.pt/~mleitao/ GSM 3 ♦ ♦ ♦ ♦ ♦ ♦ ♦ What are the main network elements of GSM? What are the GSM addresses? How is the

    Premium GSM

    • 2943 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    King David: A Short Story

    • 887 Words
    • 4 Pages

    King David opens the right door completely to a waiting Earl Michal and First Commander Cipher‚ who are staring back at their respected kings. “Take him to see the prisoner‚” he commands‚ handing the key to Michal. “King Robert‚” Cipher calls his name. King Robert moves to him‚ speaking into his ear. Cipher nods back‚ turning to another‚ and speaking privately with him. King Robert returned to King David and said‚ “It’s done.” King David nods

    Premium KILL Oedipus Sophocles

    • 887 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Inside Joseph Schloss’s book‚ Foundation: B-Boys‚ B-Girls and Hip-Hop Culture in New York shows and analyses the hip-hop cultures origins whilst remaining predominately specific to “B-Boys.” He does this by going through the history and origins of B-Boys and B-Girls from 2003 to 2008 in New York. Joseph G. Schloss shows the progression and evolution of cultural differences from different regions by showing the varying differences in experiences of dancers. Although Hip-Hop has been given negative

    Premium Hip hop music Hip hop Funk

    • 981 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Ssh/Tls

    • 5132 Words
    • 21 Pages

    Secure Socket Layer and Transport Layer Security A look at the SSL/TLS Protocol Implementation. Table of Contents 1 Introduction 3 2 Technology Overview 4 3 Real-World Usage 6 4 Protocol Evolution 9 5 Technological Benefits 9 6 Future Implications 11 7 Conclusion 12 8 References 14 9 Appendix A - SSL Labs Test Grade A 16 10 Appendix B - SSL Labs Test Grade B 20 11 Appendix C - SSL Labs Test Grade C 25 12 Appendix D - SSL Labs Test Grade

    Free Transport Layer Security

    • 5132 Words
    • 21 Pages
    Best Essays
  • Powerful Essays

    Mabel: A Short Story

    • 1709 Words
    • 7 Pages

    noticed a storm of ants come crawling out of the hat. Luckily‚ nobody got hurt but there was broken stone pieces all over the grounds. "Whoops‚" Candy looked at the debris‚ then began to examine the statue‚ a now hat-less and revealed to be bald bill cipher. Grenda joined her‚ while Mabel took a few glances at the statue‚ before stepping in and deciding to examine it as well‚ bringing out her glittery notebook along with a feathery pen. She figured this qualified as something incredibly weird‚ and decided

    Premium Smile The Bill De tribus puellis

    • 1709 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Espionage During Wwii

    • 1258 Words
    • 6 Pages

    occurred due to various forms of espionage and deception. Depending on which side of the fence you ’re sitting on‚ espionage was either a blessing or a curse. Coding and encryption were two very important elements in the use of espionage. Enigmas were cipher machines that were based mainly on a wired code wheel. The wired code wheel‚ known more commonly as a rotor‚ would be shaped similar to a hockey puck made of non-conductive material‚ such as rubber‚ and have two sides‚ an input plate and an output

    Premium World War II

    • 1258 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    digital revolution. He went on to create mathematical logic including the Enigma cipher machine which he helped the British government decipher the Nazi German communications (Hodges‚ 1995). According to E2BN (2008)‚ “The fact remains that everyone who taps at a keyboard‚ opening a spreadsheet or a word-processing program‚ is working on an incarnation of a Turing machine." Creative Mind Alan Turing’s Enigma cipher machine has been said to have ended WWII two years earlier than projected and saved

    Premium Computer Alan Turing Algorithm

    • 527 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Alan Turing Research Paper

    • 1300 Words
    • 6 Pages

    of the rotors. This machine consisted of twelve different rotor variations (Underwood Industrialization of Codebreaking). Turing revised the bombe by also making it recognize certain “cribs”. A crib is an algorithm of letters which match up to the cipher letters. To figure out if a message was lined up correctly‚ Turing had to make sure a letter did not match up to itself. It was easier to find cribs in the formulaic messages such as the “Heil Hitler” and “weather”. After finding the correct placement

    Premium Alan Turing Enigma machine Bletchley Park

    • 1300 Words
    • 6 Pages
    Better Essays
Page 1 12 13 14 15 16 17 18 19 50